Transcript of "Code Red Virus"

1.
Code Red Virus <ul><li>A computer worm observed on the Internet on July 13, 2001. It attacked computers running Microsoft's IIS web server. The most in-depth research on the worm was performed by the programmers at eEye Digital Security. </li></ul>

2.
Love Bug Virus <ul><li>The virus arrived in e-mail boxes on May 4, 2000, with the simple subject of &quot;ILOVEYOU&quot; and an attachment &quot;LOVE-LETTER-FOR-YOU.TXT.vbs&quot;. Upon opening the attachment, the virus sent a copy of itself to everyone in the user's address list, posing as the user. It also made a number of malicious changes to the user's system </li></ul>

3.
Biometric Computer Security <ul><li>Is a new type of security using finger print, iris scanning and many other ways to help step up security </li></ul>

4.
Phishing Scheme <ul><li>phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication </li></ul>

5.
<ul><li>3 advantages </li></ul><ul><ul><li>It is possibly the most reliable security system </li></ul></ul><ul><ul><li>Only one person can access it </li></ul></ul><ul><ul><li>It isn’t possible for someone to find out your password </li></ul></ul>Biometric Security

6.
<ul><li>3 disadvantages </li></ul><ul><ul><li>Only one person has the ability to log on </li></ul></ul><ul><ul><li>If something happens where you can not perform the biometric security process, you will not be able to access the computer </li></ul></ul><ul><ul><li>It costs a good deal of money to get biometric security </li></ul></ul>Biometric Security cont.

7.
<ul><li>Ways it attacks viruses: </li></ul><ul><ul><li>Detects viruses through signatures or malicious activity </li></ul></ul><ul><ul><li>There are often anti-virus programs that are just for some specific viruses </li></ul></ul>Anti-Virus software